/freebsd-10.2-release/crypto/openssh/ |
H A D | cipher-chachapoly.h | 35 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | cipher.c | 356 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag. 358 * Both 'aadlen' and 'authlen' can be set to 0. 364 u_int len, u_int aadlen, u_int authlen) 368 aadlen, authlen, cc->encrypt); 369 if (authlen) { 372 if (authlen != cipher_authlen(cc->cipher)) 373 fatal("%s: authlen mismatch %d", __func__, authlen); 381 authlen, (u_char *)src + aadlen + len)) 385 if (authlen 363 cipher_crypt(CipherContext *cc, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen) argument [all...] |
H A D | cipher-chachapoly.c | 50 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) 49 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) argument
|
H A D | packet.c | 859 u_int i, len, authlen = 0, aadlen = 0; local 871 if ((authlen = cipher_authlen(enc->cipher)) != 0) 875 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 952 cp = buffer_append_space(&active_state->output, len + authlen); 955 len - aadlen, aadlen, authlen) != 0) 1267 u_int maclen, authlen = 0, aadlen = 0, block_size; local 1280 if ((authlen = cipher_authlen(enc->cipher)) != 0) 1285 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1343 DBG(debug("partial packet: block %d, need %d, maclen %d, authlen %d," 1344 " aadlen %d", block_size, need, maclen, authlen, aadle [all...] |
H A D | kex.c | 467 u_int mode, ctos, need, dh_need, authlen; local 509 authlen = cipher_authlen(newkeys->enc.cipher); 510 if (authlen == 0) 527 authlen == 0 ? newkeys->mac.name : "<implicit>",
|
H A D | authfile.c | 99 size_t keylen, ivlen, blocksize, authlen; local 123 authlen = cipher_authlen(c); 172 cp = buffer_append_space(&encoded, buffer_len(&b) + authlen); 174 authlen) != 0) 210 size_t authlen; local 324 authlen = cipher_authlen(c); 356 ret = cipher_crypt(&ctx, 0, cp, buffer_ptr(©), len, 0, authlen);
|
/freebsd-10.2-release/lib/libstand/ |
H A D | rpc.c | 66 u_int32_t authlen; /* auth length */ member in struct:auth_info 146 auth->authlen = 0; 155 auth->authlen = htonl(sizeof(struct auth_unix)); 161 auth->authlen = 0; 204 x = ntohl(auth->authlen);
|
/freebsd-10.2-release/contrib/tcpdump/ |
H A D | print-esp.c | 80 int authlen; member in struct:sa_list 119 end = end - sa->authlen; 222 int authlen = 0; local 238 authlen = 12; 250 sa->authlen = 0; 256 sa->authlen = authlen; 300 sa->authlen = 12; 654 ep = ep - sa->authlen;
|
H A D | print-zephyr.c | 47 int authlen; member in struct:z_packet 174 PARSE_FIELD_INT(z.authlen);
|
/freebsd-10.2-release/sys/nfs/ |
H A D | krpc_subr.c | 81 u_int32_t authlen; /* auth length */ member in struct:auth_info 293 call->rpc_auth.authlen = txdr_unsigned(sizeof(struct auth_unix)); 296 call->rpc_verf.authlen = 0; 415 len += fxdr_unsigned(u_int32_t, reply->rp_auth.authlen);
|
/freebsd-10.2-release/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 591 int authlen; /* offset of MAC field */ local 721 authlen = LEN_PKT_NOMAC; 722 has_mac = rbufp->recv_length - authlen; 735 skeyid = ntohl(((u_int32 *)pkt)[authlen / 4]); 739 opcode = ntohl(((u_int32 *)pkt)[authlen / 4]); 743 || (int)len + authlen > rbufp->recv_length) { 755 ep = (struct exten *)&((u_int32 *)pkt)[authlen / 4]; 773 authlen += len; 892 authlen, 901 skeyid, authlen 3658 size_t sendlen, authlen; local [all...] |
H A D | ntp_crypto.c | 428 int authlen; /* offset of MAC field */ local 452 authlen = LEN_PKT_NOMAC; 454 while ((macbytes = rbufp->recv_length - authlen) > (int)MAX_MAC_LEN) { 459 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 467 peer->crypto, authlen, len, code >> 16, 1056 authlen += (len + 3) / 4 * 4;
|